Sciweavers

483 search results - page 41 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
143
Voted
INFOCOM
2002
IEEE
15 years 8 months ago
Constraint-based path selection methods for on-demand provisioning in WDM networks
Abstract-- We propose a framework for decentralized path selection and on-demand wavelength channel provisioning in WDM networks with routing constraints. Within this framework, th...
Admela Jukan, Gerald Franzl
118
Voted
ICPP
1999
IEEE
15 years 7 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida
ICWS
2007
IEEE
15 years 5 months ago
Research on Service-Oriented Workflow and Performance Evaluation
The advent of SOA and Grid technology has brought new challenges to workflow operation and performance evaluation. In this paper, the characteristics of service-oriented workflow ...
Bo Liu, Yushun Fan
127
Voted
DIM
2009
ACM
15 years 10 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
114
Voted
ISW
2004
Springer
15 years 8 months ago
Re-thinking Security in IP Based Micro-Mobility
Security problems in micro-mobility are mostly related to trust establishment between mobile nodes and middle-boxes, i.e. mobile anchor points. In this paper, we present a secure m...
Jukka Ylitalo, Jan Melén, Pekka Nikander, V...